+

Cookies on the Business Insider India website

Business Insider India has updated its Privacy and Cookie policy. We use cookies to ensure that we give you the better experience on our website. If you continue without changing your settings, we\'ll assume that you are happy to receive all cookies on the Business Insider India website. However, you can change your cookie setting at any time by clicking on our Cookie Policy at any time. You can also see our Privacy Policy.

Close
HomeQuizzoneWhatsappShare Flash Reads
 

DDOS, cold boot attacks, and quantum keys - here's how people protect and intercept data

Sep 2, 2016, 02:01 IST

Ever since humans began sending messages to each other, dubious efforts have been made to intercept them.

Advertisement

Whether these messages were sent via snail mail or through an outdated Turing machine, a wide array of groups and countries have plenty to gain or lose by either intercepting them, or by failing to employ sufficient methods to protect them.

The following infographic from the New Jersey Institute of Technology goes through a brief history of encryption methods, from the telegraph to the more advanced method of Advanced Encryption Standard (AES), along with several prominent issues plaguing these services.

NJIT Computer Science Online

NOW WATCH: Hackers can take over an entire network with this tiny $35 box

Please enable Javascript to watch this video
Next Article